DISARMframeworks/generated_files/DISARM_STIX/attack-pattern/attack-pattern--107e3180-34f6-4e11-a952-705df35b52f7.json

40 lines
1.7 KiB
JSON
Raw Normal View History

2022-02-20 15:37:38 -05:00
{
"type": "bundle",
2022-07-02 16:01:17 -04:00
"id": "bundle--4174c131-9a90-4d85-b11d-439b04438456",
2022-02-20 15:37:38 -05:00
"objects": [
{
"type": "attack-pattern",
"spec_version": "2.1",
2022-07-02 16:01:17 -04:00
"id": "attack-pattern--107e3180-34f6-4e11-a952-705df35b52f7",
"created_by_ref": "identity--9b2c579f-fdf5-4585-ba48-f4bfdcf6e703",
"created": "2022-07-02T19:59:12.731474Z",
"modified": "2022-07-02T19:59:12.731474Z",
"name": "Launder Accounts",
2022-07-02 16:01:17 -04:00
"description": "Account laundering occurs when an influence operation acquires control of previously legitimate online accounts from third parties through sale or exchange and often in contravention of terms of use. Influence operations use laundered accounts to reach target audience members from an existing information channel and complicate attribution. ",
2022-02-20 15:37:38 -05:00
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
2022-06-30 23:30:18 -04:00
"phase_name": "persist-in-the-information-environment"
2022-02-20 15:37:38 -05:00
}
],
"external_references": [
{
"source_name": "DISARM",
"url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0128.004.md",
"external_id": "T0128.004"
2022-02-20 15:37:38 -05:00
}
],
"object_marking_refs": [
2022-07-02 16:01:17 -04:00
"marking-definition--1f97face-a051-4873-be69-61a6fb53fc4a"
2022-02-20 15:37:38 -05:00
],
"x_mitre_is_subtechnique": true,
2022-02-20 15:37:38 -05:00
"x_mitre_platforms": [
"Windows",
"Linux",
"Mac"
],
"x_mitre_version": "1.0"
2022-02-20 15:37:38 -05:00
}
]
}